Endeavouring to be in the good books. Awarding DTN network use for acknowledging the reception of bundles
暂无分享,去创建一个
[1] Ying Li,et al. Fair Exchange Signature Schemes , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).
[2] Levente Buttyán,et al. Barter trade improves message delivery in opportunistic networks , 2010, Ad Hoc Networks.
[3] Songwu Lu,et al. Secure Incentives for Commercial Ad Dissemination in Vehicular Networks , 2012, IEEE Trans. Veh. Technol..
[4] Carlos Borrego,et al. A store-carry-process-and-forward paradigm for intelligent sensor grids , 2013, Inf. Sci..
[5] Srinivasan Keshav,et al. Low-cost communication for rural internet kiosks using mechanical backhaul , 2006, MobiCom '06.
[6] J. Harsanyi. Rational Behaviour and Bargaining Equilibrium in Games and Social Situations , 1977 .
[7] R. Srikant,et al. DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks , 2007, MobiCom '07.
[8] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[9] Yin Zhang,et al. Incentive-aware routing in DTNs , 2008, 2008 IEEE International Conference on Network Protocols.
[10] Jörg Ott,et al. The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.
[11] Jörg Ott,et al. Applicability of identity-based cryptography for disruption-tolerant networking , 2007, MobiOpp '07.
[12] Noam Nisan,et al. Algorithms for Selfish Agents , 1999, STACS.
[13] Stephen Farrell,et al. Delay- and Disruption-Tolerant Networking , 2006, IEEE Internet Computing.
[14] Kevin C. Almeroth,et al. Coupons: A Multilevel Incentive Scheme for Information Dissemination in Mobile Networks , 2008, IEEE Transactions on Mobile Computing.
[15] Chaki Ng,et al. Mirage: a microeconomic resource allocation system for sensornet testbeds , 2005, The Second IEEE Workshop on Embedded Networked Sensors, 2005. EmNetS-II..
[16] Silvia Giordano,et al. Mobile ad hoc networks , 2002 .
[17] Levente Buttyán,et al. Barter-based cooperation in delay-tolerant personal wireless networks , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[18] Scott C. Burleigh,et al. Bundle Protocol Specification , 2007, RFC.
[19] William P. Marnane,et al. Identity- Based Cryptography , 2008 .
[20] Jianying Zhou,et al. An intensive survey of fair non-repudiation protocols , 2002, Comput. Commun..
[21] M. Joye,et al. Identity-Based Cryptography - Volume 2 Cryptology and Information Security Series , 2008 .
[22] P. Gács,et al. Algorithms , 1992 .
[23] R. Srikant,et al. Achieving cooperation in multihop wireless networks of selfish nodes , 2006, GameNets '06.
[24] Cauligi S. Raghavendra,et al. Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.
[25] Zhenfu Cao,et al. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .
[26] Christos H. Papadimitriou,et al. Algorithms, games, and the internet , 2001, STOC '01.
[27] Noam Nisan,et al. Algorithms for selfish agents mechanism design for distributed computation , 1999 .
[28] Arun Venkataramani,et al. DTN routing as a resource allocation problem , 2007, SIGCOMM '07.
[29] Olivier Markowitch,et al. Probabilistic Non-Repudiation without Trusted Third Party , 1999 .
[30] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[31] Bobby Bhattacharjee,et al. Bittorrent is an auction: analyzing and improving bittorrent's incentives , 2008, SIGCOMM '08.
[32] Kyung Sup Kwak,et al. Fair exchange signature schemes , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).
[33] Qinghua Li,et al. Mitigating Routing Misbehavior in Disruption Tolerant Networks , 2012, IEEE Transactions on Information Forensics and Security.
[34] Margo I. Seltzer,et al. Isolation with Flexibility: A Resource Management Framework for Central Servers , 2000, USENIX Annual Technical Conference, General Track.
[35] Xiaodong Lin,et al. Pi: A practical incentive protocol for delay tolerant networks , 2010, IEEE Transactions on Wireless Communications.
[36] Jeff Chase,et al. Self-recharging virtual currency , 2005, P2PECON '05.
[37] Xiaodong Lin,et al. SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks , 2009, IEEE Transactions on Vehicular Technology.
[38] Tim Roughgarden,et al. How bad is selfish routing? , 2002, JACM.
[39] Zhili Sun,et al. Routing in Delay/Disruption Tolerant Networks: A Taxonomy, Survey and Challenges , 2013, IEEE Communications Surveys & Tutorials.
[40] Jean-Pierre Hubaux,et al. Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .